The Four Levels of Mobile Security and Management

24
The four levels of Enterprise Mobility Management Why Mobile Device Management is only the beginning – and where you can go from here

Transcript of The Four Levels of Mobile Security and Management

The four levels of Enterprise Mobility Management Why Mobile Device Management is only the beginning – and where you can go from here

Mobile working has come a very long way in a very short time.Your people aren’t just using mobile devices at work, they’re using them to work. And it’s great for your business.

What isn’t so great is the risk that all this mobile working exposes your company to. Or the strain that managing and maintaining an ever growing volume of devices, apps and content places on IT.

That’s where Enterprise Mobility Management comes in.

But as we’ll see, Enterprise Mobility Management has many flavors – and many levels of protection and control.Here’s a typical progression:0. No security at all (the ‘cross fingers

and pray’ approach)1. Mobile Device Management (MDM)2. Secure Workspaces3. Mobile Application Management4. Mobile Content Management

Chances are, you haven’t thought about all four.

And you really need to.

Why? We’ll explain with a story...

This is Josh, the founder and CEO of JoshCo Inc.Whatever it is JoshCo does, they do it brilliantly, growing to 300 employees, and just as many mobile devices in under three years.

Happily, Josh has already appointed his old friend Tim to be Overlord of IT.

(The power to choose his own job title was non-negotiable.)

For two, interminable hours, panic reigns. Just as the hysteria reaches its full height, a kindly cab driver appears, laptop in hand, back at JoshCo HQ.

Level 1

Not long after Tim’s arrival, Josh leaves his smartphone on the back seat of a taxicab, its memory brimming with sensitive, unencrypted files.

In the days following the scare, Tim suggests that JoshCo steps up to the first level of enterprise mobility management, and invests in MDM.MDM lets him secure, manage and monitor all the company’s smartphones, tablets, and even laptops, from his desk.

He’s now able to do essential things like:• Quickly enroll devices into

the business environment• Update device settings

over-the-air• Enforce security policies

and compliance

But it’s not very fine-grained.

Because it secures and manages the entire device, users don’t always like MDM.

They can’t separate their personal apps and content from the sensitive, corporate stuff. So the company ends up being liable for the whole thing.

Might be time for another level of mobile management…

MDM is fine for device-level security and management.

Within a day, they’re utterly inseparable. He starts bringing it to board meetings, and suggesting everyone else does the same with their own personal tech.

Level 2

A few weeks later, Josh falls in love. With a tablet.

He sees his precious network become prey to all manner of shadowy devices and threats.

He pales—visibly—at the thought of corporate and personal data mingling on a hundred tablets, and the security and privacy minefield that lies ahead.

Tim nods and smiles. And shudders inwardly.

Rather than rain on Josh’s parade – or fully commit to a nervous breakdown – Tim proposes to add a second level of enterprise mobility management.

He suggests a secure workspace solution to separate out the business apps from the personal, and give him the power to manage them independently.

Bring on the Secure Workspaces

• Separate personal and corporate data on everyone’s devices

• Manage devices, policies and profiles based on ownership type

And the users all love that there’s separation between the personal and the corporate sides of their devices.

Soon, Tim is back at the top of his game, reveling in his new ability to:

This time, it’s with a new productivity app he read about in Wired.

He emails everyone in the company to tell them just how great it is, and how they all need to start using it ASAP.

Level 3

Then, Josh falls in love again.

Josh’s new beloved app has been storing his username and password on his smartphone.

An opportunist hacker has swiped the phone in a cafe, and since Josh uses the same password for everything, used the information to break into JoshCo’s customer database.

Two weeks later, there’s a security breach.

Tim leaps into action. He sources and deploys a Mobile Application Management solution.

With this third level of mobile security in place, he’s able to scan apps for common risks, apply additional security if needed, and then automatically distribute updates to all devices.

He’s also able to:

• Block or restrict apps as necessary

• ‘Wrap’ public and third-party apps for additional security

• Use special software development tools to build new apps, with advanced security

• Create JoshCo’s own, secure, enterprise app store

Users love how quickly they can download their chosen apps from the company app store – and that the IT department doesn’t have to worry about Angry Birds or all those weird and wacky personal apps.

Enter Mobile Application Management

Tim looks at the types of content people are viewing on their mobile devices, how they’re sharing files, and how they’re accessing corporate data.

And he’s not at all happy with what he finds.

Level 4

Still reeling from the recent breach, Josh asks Tim to comprehensively audit enterprise mobility management at JoshCo.

He puts in place a state-of-the-art Mobile Content Management solution, and JoshCo finally achieves all four levels of enterprise mobility management.

The solution keeps the organization’s sensitive content – financial reports, sales materials etc. – in the same, safe place.

It also protects any piece of content in a security layer that can apply policy – in as granular a way as needed (by role, by app, by date, by file type…).

Mobile Content Management is here.

• Documents can be encrypted

• He can restrict offline viewing, and even copy and paste capabilities

• He’s got a full set of document analytics

And authorized users get secure, real-time access to critical content through whatever device they’ve got to hand – with no sacrifice on the security front.

Tim gets to relax, a little, knowing:

But enough about JoshCo. Let’s talk about you.What do you need to do to protect your organization?

Your organization may have leapt to level two, and instituted a secure workspace solution without MDM.

Or, you may have tackled your concerns around content sharing, but not even considered the risks of mobile application use.

Well… everyone’s mobility management story is different.

That way, your organization can get excited about mobile working. And start enjoying its many, many benefits.

Whatever your situation, it’s time to recognize the dangers, and close the gaps.

Not sure where to start?Sprint Business can help you level up all aspects of your enterprise mobility management, whatever your story so far.

Our Enterprise Mobility Management solutions support:

• Nearly every kind of mobile device – phones, tablets, laptops, rugged devices

• Windows, iOS, Android and BlackBerry mobile platforms

• Various types of deployment – corporate owned, line of business, BYOD

• All levels of Mobile Security and Management – from MDM through full content management

Thank you!

Give us a call at 877-633-1102 or visit sprint.com/business to learn more

Wherever you are on your enterprise mobility management journey, we can help – and, frankly, we’d love to.